Re: systematic Kerberization

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, May 11, 2004 at 08:10:30AM -0600, Stephen Smoogen wrote:
> The standard way I have seen it implemented on other versions of Linux
> (here and other large organizations) is that the central authentication
> is used first in the pam stack and if it fails/isnt available you get
> authorized against the local password db which if it works lets you in.

"Other versions" including Red Hat Linux up until it suddenly stopped
working circa version 7.3.

<https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=55193>


-- 
Matthew Miller           mattdm@xxxxxxxxxx        <http://www.mattdm.org/>
Boston University Linux      ------>                <http://linux.bu.edu/>



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux